The Senate has advanced legislation that would require law enforcement agencies to obtain a warrant from a judge before they could access someone's email or other data stored in the cloud.

Currently, under the Electronic Communications Privacy Act (ECPA), law enforcement agencies can subpoena any email that's been opened by a recipient or that's more than 180 days old; no warrant -- and accompanying requirement to first demonstrate probable cause -- required.

But the Leahy-Lee ECPA Amendments Act, approved Thursday by the Senate Judiciary Committee, would prohibit warrantless access to stored, online communications. "The bill would require law enforcement agents to obtain a warrant in order to gain access to the contents of email and of documents, pictures and other information stored in the cloud," said Greg Nojeim, senior counsel at the civil rights group Center for Democracy & Technology (CDT), in a blog post.

"I have long believed that our government should obtain a search warrant -- issued by a court -- before gaining access to private communications," Senate Judiciary Committee Chairman Patrick Leahy (D-Vt.) said earlier this month, reportedThe Hill. "I have worked over the last several years to update our federal privacy laws to better safeguard our privacy rights in the digital age."

Law enforcement, business and academic representatives have been urging Congress to revise the ECPA -- which was passed in 1986 and updated in 1994 and in 2001 -- for years, albeit not always in the same way. While civil rights groups have called for greater privacy protections to be extended to emails, for example, the Justice Department has lobbied Congress to leave ECPA unchanged.

Congressional efforts to reform ECPA seemed to gain renewed vigor last year, however, after the FBI's investigation into allegedly threatening emails sent anonymously to Jill Kelly, a friend of then-director of the CIA David H. Petraeus. The investigation revealed that Petraeus was having an extramarital affair with his biographer, Paula Broadwell. The pair coordinated their affair, at least in part, by saving draft emails to each other in a shared Gmail account, which the FBI would have been able to access without a warrant.

While ECPA was designed to balance people's privacy rights with the needs of law enforcement agencies investigating crimes, privacy rights groups have accused the Department of Justice of taking an overly broad interpretation to ECPA, based on the agency's reading that old emails aren't subject to the protection of the Stored Communications Act, which limits the ability of police to compel service providers to disclose data without a warrant.

After the Ninth Circuit Court of Appeals, which covers the western United States -- including California -- ruled that the Stored Communications Act did apply to emails, the Justice Department advised investigators that when accessing emails more than 180 days old without using a warrant, they should do so outside the court's jurisdiction.

A well-defended perimeter is only half the battle in securing the government's IT environments. Agencies must also protect their most valuable data. Also in the new, all-digital Secure The Data Center issue of InformationWeek Government: The White House's gun control efforts are at risk of failure because the Bureau of Alcohol, Tobacco, Firearms and Explosives' outdated Firearms Tracing System is in need of an upgrade. (Free registration required.)

Welcome to
TechWeb, the IT professional's online resource for news coverage of the
information technology industry. We know technology news. Our mobile
and wireless news coverage moves as fast as wireless technology itself.
We follow all the devices you depend on to stay connected. Our software
coverage follows the multi-faceted software industry from every angle.
We've got a lock on network security and computer security issues.
We're all over the business of the Web--the Internet business--and the
engines that run it. We have our eyes and ears tuned to the players who
make and run the tools that tie us all together--Google, Microsoft,
eBay, Cisco, Yahoo, Oracle, Apple, Sony--and scores of others. And we
keep close tabs on the backbone of information technology, PC hardware.
We know PCs and Apple computers inside and out. We cover computer
technology, computer news, software news, search engine news, business
software, operating systems, and software development. Our coverage of
tech news includes a strong focus on the security business, its
attendant spyware and viruses, how security relates to wireless
technology and business networking and the security issues surrounding
RFID technology. We closely follow developments in Internet news and
Internet technology, including the spread of broadband and its effect
on Web browsers and the Web business. We watch the VoIP business, and
how VoIP technology is affecting the state of telephony in the
enterprise. And if all that isn't enough, we also track developments in
the IT industry that affect IT jobs, IT careers, and outsourcing.